Analysis
-
max time kernel
65s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
Contract Signed...pdf...exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Contract Signed...pdf...exe
Resource
win10v2004-20230220-en
General
-
Target
Contract Signed...pdf...exe
-
Size
612KB
-
MD5
aaab701f2ebada6182830d00673ecddb
-
SHA1
1094c5284c99c7666ce8edc97d830d6d2c2037df
-
SHA256
80d9a24ac09643fec02e6c44b6fc4c77390e7a068fa37c13c44f2e1a6962b89e
-
SHA512
44a2e97de85b5b24dd1092922013e20eb69b045945e354b49f237edbf7f8587dd39c87432a99cc4ae7a8bdd4d77d1bf8df21530fc0b7a71d28f394ba694ba38d
-
SSDEEP
12288:vPGregKpG7hkBvU5EFcDqmf+d8LpCoCpAuL3ULCRSyCJ:v8egL7hkBvUOc+bETyAm3ULCRlu
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5810723995:AAFzOu_h50ZboqfLSMvb7-HvSrH1c76uDfA/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Contract Signed...pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Contract Signed...pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Contract Signed...pdf...exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 1716 1552 Contract Signed...pdf...exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1552 Contract Signed...pdf...exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1552 Contract Signed...pdf...exe Token: SeDebugPrivilege 1716 Contract Signed...pdf...exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 Contract Signed...pdf...exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1440 1552 Contract Signed...pdf...exe 27 PID 1552 wrote to memory of 1440 1552 Contract Signed...pdf...exe 27 PID 1552 wrote to memory of 1440 1552 Contract Signed...pdf...exe 27 PID 1552 wrote to memory of 1440 1552 Contract Signed...pdf...exe 27 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 PID 1552 wrote to memory of 1716 1552 Contract Signed...pdf...exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Contract Signed...pdf...exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Contract Signed...pdf...exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"C:\Users\Admin\AppData\Local\Temp\Contract Signed...pdf...exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1716
-